26 Oct Analyzing Images to Identify Suspicious or Modified Files
Please READ the INSTRUCTIONS carefully.
Part 1: Analyzing Images to Identify Suspicious or Modified Files
write one page that discusses the elements listed below.
Briefly describe the file recovery methods used in the lab.
Explain how to sort and analyze image files using E3 Commander’s Sorting feature.
Part 2: Recognizing the Use of Steganography in Image Files
write one page that discusses the topic below.
Explain how to extract steganographic sequestered data from an identified image files while conserving their integrity.
Remember to include an introduction for the written portions of the paper. APA formatting is required, and citations and references for any paraphrased material should be present.
